{"id":59375,"date":"2025-09-19T00:00:00","date_gmt":"2025-09-19T00:00:00","guid":{"rendered":"urn:uuid:ccbbcd3a-4ce4-f40a-c343-854fc0db178e"},"modified":"2025-09-19T00:00:00","modified_gmt":"2025-09-19T00:00:00","slug":"how-ai-native-development-platforms-enable-fake-captcha-pages","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/","title":{"rendered":"How AI-Native Development Platforms Enable Fake Captcha Pages"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80\"><!-- OneTrust Cookies Consent Notice start for trendmicro.com --><!-- OneTrust Cookies Consent Notice end for trendmicro.com --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"> <meta name=\"description\" content=\"Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"artificial intelligence (ai),web,research,phishing,articles, news, reports,cyber threats\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2025-09-19\"> <meta property=\"article:tag\" content=\"artificial intelligence (ai)\"> <meta property=\"article:section\" content=\"research\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/ai-development-platforms-enable-fake-captcha-pages.html\"> <title>How AI-Native Development Platforms Enable Fake Captcha Pages | Trend Micro (US)<\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.eef9161aa6f636be94dc8f75bd21e83f.css\" type=\"text\/css\">\n<link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendmicro\/clientlibs\/trendmicro-core-2\/clientlibs\/header-footer.min.ed72bbd5ec8a033bb224030ee7e2c12e.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/ai-development-platforms-enable-fake-captcha-pages.html\"><br \/>\n<meta property=\"og:title\" content=\"How AI-Native Development Platforms Enable Fake Captcha Pages\"><br \/>\n<meta property=\"og:description\" content=\"Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.\"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/ai-lovable-cover.png\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"How AI-Native Development Platforms Enable Fake Captcha Pages\"><br \/>\n<meta name=\"twitter:description\" content=\"Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.\"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/thumbnails\/25\/ai-lovable-cover.png\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.711970945663\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layers *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"2134189439\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"11.5\">\n<div class=\"article-details\" role=\"heading\" readability=\"43\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__display-tag\">Artificial Intelligence (AI)<\/p>\n<p class=\"article-details__description\">Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns.<\/p>\n<p class=\"article-details__author-by\">By: Ryan Flores, Bakuei Matsukawa <time class=\"article-details__date\">September 19, 2025<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<div class=\"article-details__icons\"> <!--Add This--> <\/p>\n<div class=\"a2a_kit a2a_default_style\" data-a2a-icon-color=\"#717172\"> <a class=\"a2a_dd addthis_link\" href=\"https:\/\/www.addtoany.com\/share\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/share-more.svg\" class=\"svg-icon\" alt=\"Share\"> <\/a> <a class=\"a2a_button_print addthis_link\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch\/resources\/img\/printer.svg\" class=\"svg-icon\" alt=\"Print\"> <\/a> <\/div>\n<p> <!--Add to Folio--> <!--Subscribe--> <\/div>\n<\/div><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-lg-8 col-lg-push-2\"> <\/p>\n<div class=\"richText\" readability=\"40.054092867401\">\n<div readability=\"25.713738630924\">\n<h2><span class=\"body-subhead-title\">Key takeaways<\/span><\/h2>\n<ul>\n<li><span class=\"rte-red-bullet\">Since January, Trend Micro has tracked a surge in phishing campaigns using AI-powered platforms (Lovable, Netlify, Vercel) to host fake captcha pages that lead to phishing websites.&nbsp; This ploy misleads users and evades security tools.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Victims are first shown a captcha, lowering suspicion, while automated scanners only detect the challenge page, missing the hidden credential-harvesting redirect.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Attackers exploit the ease of deployment, free hosting, and credible branding of these platforms.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Defenders should train employees to recognize captcha -based phishing, adopt layered defenses that follow redirects, and monitor trusted hosting domains for abuse.<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/what-is\/ai.html\">Artificial intelligence<\/a> has revolutionized web development, empowering even novice users to create professional-looking websites. Tools like Lovable enable anyone to build and host applications with little to no coding knowledge, while Netlify and Vercel position themselves as AI-native development platforms. However, cybercriminals are increasingly exploiting these services to create and host fake captcha challenge websites, which serve as entry points for phishing campaigns.<\/p>\n<p>Since January, Trend Micro has observed a rise in fake captcha pages hosted on such platforms. These scams pose a dual threat: misleading users while evading automated security systems.<\/p>\n<h2><span class=\"body-subhead-title\">The social engineering ploy<\/span><\/h2>\n<p>The phishing campaigns typically begin with spam emails carrying urgent messages such as: \u201c<i>Password Reset Required<\/i>\u201d or \u201c<i>USPS Change of Address Notification<\/i>\u201d, which are standard tactics that are a staple of these types of attacks.<\/p>\n<p>Clicking the embedded URL directs the target to what appears to be a harmless captcha verification page (see Figure 1). The ruse functions in two ways:<\/p>\n<ol>\n<li><b>Delaying suspicion<\/b> \u2013 By presenting a captcha challenge first, victims are less likely to recognize the page as malicious, lowering their guard.<\/li>\n<li><b>Detection evasion<\/b> \u2013 Automated scanners crawling the page encounter only a captcha, not the underlying credential-harvesting form, reducing the likelihood of the scam being flagged.<\/li>\n<\/ol><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"86c5c4\" data-modal-title=\"Figure 1. Fake captcha page\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig1.png\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig1.png\" alt=\"Figure 1. Fake captcha page\"> <\/a> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 1. Fake captcha page<\/figcaption><\/div>\n<\/figure><\/div>\n<div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"df390a\" data-modal-title=\"Figure 2. Captcha page does not redirect to the phishing page if the answer is incorrect\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig2.png\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig2.png\" alt=\"Figure 2. Captcha page does not redirect to the phishing page if the answer is incorrect\"> <\/a> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 2. Captcha page does not redirect to the phishing page if the answer is incorrect<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"32.5\">\n<div readability=\"10\">\n<p>Once the captcha is completed, the victim is redirected to the actual phishing page, where their credentials and other sensitive data can be stolen.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"2f7af0\" data-modal-title=\"Figure 3. Phishing page after the captcha is solved\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig3.png\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig3.png\" alt=\"Figure 3. Phishing page after the captcha is solved\"> <\/a> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 3. Phishing page after the captcha is solved<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"bc269f\" data-modal-title=\"Figure 4. Other phishing pages target Microsoft 365 credentials\" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig4.png\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig4.png\" alt=\"Figure 4. Other phishing pages target Microsoft 365 credentials\"> <\/a> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 4. Other phishing pages target Microsoft 365 credentials<\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"43.030575539568\">\n<div readability=\"31.654676258993\">\n<h2><span class=\"body-subhead-title\">AI-powered hosting platforms: A double-edged sword<\/span><\/h2>\n<p>Platforms like Lovable, Netlify, and Vercel are designed to simplify development and lower barriers to entry. Unfortunately, the same strengths that empower developers can also be exploited by attackers:&nbsp;<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Ease of deployment<\/b>: Minimal technical skills are required to set up convincing fake captcha sites. &nbsp;On Lovable, attackers can use <a href=\"https:\/\/cloud.google.com\/discover\/what-is-vibe-coding\">vibe coding<\/a> to generate a fake captcha or phishing page, while Netlify and Vercel make it simple to integrate AI coding assistants in the CI\/CD pipeline to churn out fake captcha pages.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Free hosting<\/b>: The availability of free tiers lowers the cost of entry for launching phishing operations.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Legitimate branding<\/b>: Domains ending in *.vercel.app or *.netlify.app inherit credibility from the platform\u2019s reputation that the attackers can leverage.<\/span><\/li>\n<\/ul>\n<h2><span class=\"body-subhead-title\">By the numbers<\/span><\/h2>\n<p>Our analysis of abuse across the three platforms reveals the following distribution of cybercriminal activity:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Vercel.app<\/b> \u2013 52 sites<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Netlify.app<\/b> \u2013 3 sites<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Lovable.app<\/b> \u2013 43 sites<\/span><\/li>\n<\/ul>\n<p>While Proofpoint previously <a href=\"https:\/\/www.proofpoint.com\/us\/blog\/threat-insight\/cybercriminals-abuse-ai-website-creation-app-phishing\">covered<\/a> the abuse of AI-driven site builders, their findings emphasized Lovable. Meanwhile, Trend data shows that Vercel, in particular, hosts even more fake captcha pages.&nbsp; While Lovable is more popular for vibe coders, Vercel and Netlify have been around longer, and threat actors might be more familiar with them.<\/p>\n<p>We first observed the abuse of AI-powered web development platforms to host fake captcha pages in January, with activity escalating sharply from February to April.&nbsp; Although the spam volume subsided in the following months, August saw a renewed spike in these types of phishing campaigns.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <a class=\"bs-modal\" id=\"bfffeb\" data-modal-title=\"Figure 5. Number of malicious emails observed by Trend containing links to AI platforms \" href=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig5a.png\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/25\/h\/ai-fake-captcha-pages\/fig5a.png\" alt=\"Figure 5. Number of malicious emails observed by Trend containing links to AI platforms \"> <\/a> <\/p>\n<div class=\"caption-image-container \"><figcaption>Figure 5. Number of malicious emails observed by Trend containing links to AI platforms <\/figcaption><\/div>\n<\/figure><\/div>\n<div class=\"richText\" readability=\"37.926136363636\">\n<div readability=\"24.347643097643\">\n<h2><span class=\"body-subhead-title\">Why fake captchas work<\/span><\/h2>\n<p>Fake CAPTCHAs represent a clever advancement in phishing tactics. They:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\"><b>Build psychological trust<\/b> \u2014 Victims assume they are completing a routine verification step.<\/span><\/li>\n<li><span class=\"rte-red-bullet\"><b>Bypass security tools<\/b> \u2014 Automated crawlers and scanners often overlook the hidden phishing redirect.<\/span><\/li>\n<\/ul>\n<p>To better understand these threats and how to defend against them, we invite you to read Trend\u2019s in-depth analysis:&nbsp;<\/p>\n<p><span class=\"body-subhead-title\">Conclusion<\/span><\/p>\n<p>The rise of <b>fake captcha phishing<\/b> highlights how attackers are weaponizing AI-powered website creation platforms. While these services drive innovation for legitimate developers, they can also provide cybercriminals with the tools to launch phishing attacks at scale, quickly and at minimal cost.<\/p>\n<p>To mitigate risk, organizations should:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Educate employees on how to spot captcha-based phishing attempts. This includes educating them to verify URLs before interacting with captchas, use password managers (which won\u2019t autofill on phishing sites), and report suspicious pages.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Implement defenses capable of analyzing redirect chains. For example, organizations can deploy security tools such as <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/one-platform.html\">Trend Vision One\ufe0f\u2122<\/a>&nbsp; that can evaluate outbound connections and block access to domains known for abuse, even if they look legitimate at first.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Monitor trusted domains for signs of abuse by tracking traffic to their subdomains, correlating logs with threat intelligence feeds, setting automated alerts or blocks for suspicious activity, and reporting malicious instances to the providers for takedowns.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Set up an email security solution (such as <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/email-and-collaboration.html\">Trend Vision One\u2122 Email and Collaboration Security<\/a>) with scanning capabilities to detect and proactively block emails containing suspicious content.<\/span><\/li>\n<\/ul>\n<p>As this entry shows, the threat extends beyond a single AI development platform service,&nbsp;underscoring the need for vigilance: what appears to be a harmless math puzzle may actually be the entry point to a highly effective phishing trap.<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">captcha200[.]netlify.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">adobepdfonlinereadercaptcharobot[.]netlify.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">captchaweb3[.]netlify.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">basvursana2025hemen[.]vercel.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">web-orpin-xi[.]vercel.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">web-pnrf[.]vercel.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">captcha-link-gateway[.]lovable.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">captcha-math-linker[.]lovable.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">captcha-office-redirect[.]lovable.app<\/span><\/li>\n<li><span class=\"rte-red-bullet\">&nbsp;get-new-pass[.]lovable.app<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/25\/i\/ai-development-platforms-enable-fake-captcha-pages.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals are abusing AI-native platforms like Vercel, Netlify, and Lovable to host fake captcha pages that deceive users, bypass detection, and drive phishing campaigns. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,10938,9511,9577,9509,9535],"class_list":["post-59375","post","type-post","status-publish","format-standard","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-artificial-intelligence-ai","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-phishing","tag-trend-micro-research-research","tag-trend-micro-research-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-19T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"How AI-Native Development Platforms Enable Fake Captcha Pages\",\"datePublished\":\"2025-09-19T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-lovable-cover:Large?qlt=80\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Artificial Intelligence (AI)\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Phishing\",\"Trend Micro Research : Research\",\"Trend Micro Research : Web\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/\",\"name\":\"How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-lovable-cover:Large?qlt=80\",\"datePublished\":\"2025-09-19T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#primaryimage\",\"url\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-lovable-cover:Large?qlt=80\",\"contentUrl\":\"https:\\\/\\\/trendmicro.scene7.com\\\/is\\\/image\\\/trendmicro\\\/ai-lovable-cover:Large?qlt=80\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/how-ai-native-development-platforms-enable-fake-captcha-pages\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How AI-Native Development Platforms Enable Fake Captcha Pages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/","og_locale":"en_US","og_type":"article","og_title":"How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2025-09-19T00:00:00+00:00","og_image":[{"url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"How AI-Native Development Platforms Enable Fake Captcha Pages","datePublished":"2025-09-19T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Artificial Intelligence (AI)","Trend Micro Research : Cyber Threats","Trend Micro Research : Phishing","Trend Micro Research : Research","Trend Micro Research : Web"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/","url":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/","name":"How AI-Native Development Platforms Enable Fake Captcha Pages 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80","datePublished":"2025-09-19T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#primaryimage","url":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80","contentUrl":"https:\/\/trendmicro.scene7.com\/is\/image\/trendmicro\/ai-lovable-cover:Large?qlt=80"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/how-ai-native-development-platforms-enable-fake-captcha-pages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"How AI-Native Development Platforms Enable Fake Captcha Pages"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=59375"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/59375\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=59375"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=59375"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=59375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}